login.secure.mygovonline.msgsecure.com.au
Open in
urlscan Pro
172.67.165.42
Malicious Activity!
Public Scan
Effective URL: https://login.secure.mygovonline.msgsecure.com.au/run/
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On October 27 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by WE1 on October 21st 2024. Valid for: 3 months.
This is the only time login.secure.mygovonline.msgsecure.com.au was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Australian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 84.32.84.32 84.32.84.32 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 | 172.67.165.42 172.67.165.42 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 2 | 95.100.135.66 95.100.135.66 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 3 | 203.161.61.2 203.161.61.2 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
2 | 104.126.37.131 104.126.37.131 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 46.105.222.81 46.105.222.81 | 16276 (OVH) (OVH) | |
4 | 23.56.202.168 23.56.202.168 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
10 | 6 |
ASN13335 (CLOUDFLARENET, US)
login.secure.mygovonline.msgsecure.com.au |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a95-100-135-66.deploy.static.akamaitechnologies.com
img1.wsimg.com |
ASN22612 (NAMECHEAP-NET, US)
PTR: server1.milnert.com
yenergyconstruction.online |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a104-126-37-131.deploy.static.akamaitechnologies.com
events.api.secureserver.net |
ASN16625 (AKAMAI-AS, US)
PTR: a23-56-202-168.deploy.static.akamaitechnologies.com
csp.secureserver.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
secureserver.net
events.api.secureserver.net — Cisco Umbrella Rank: 13177 csp.secureserver.net — Cisco Umbrella Rank: 13220 |
600 B |
3 |
yenergyconstruction.online
2 redirects
yenergyconstruction.online |
591 B |
2 |
wsimg.com
1 redirects
img1.wsimg.com — Cisco Umbrella Rank: 10296 |
21 KB |
1 |
postimg.cc
i.postimg.cc — Cisco Umbrella Rank: 17317 |
481 B |
1 |
msgsecure.com.au
login.secure.mygovonline.msgsecure.com.au |
1 KB |
1 |
nosokhome.online
1 redirects
nosokhome.online |
338 B |
10 | 6 |
Domain | Requested by | |
---|---|---|
4 | csp.secureserver.net |
img1.wsimg.com
|
3 | yenergyconstruction.online |
2 redirects
login.secure.mygovonline.msgsecure.com.au
|
2 | events.api.secureserver.net |
img1.wsimg.com
|
2 | img1.wsimg.com |
1 redirects
login.secure.mygovonline.msgsecure.com.au
|
1 | i.postimg.cc | |
1 | login.secure.mygovonline.msgsecure.com.au | |
1 | nosokhome.online | 1 redirects |
10 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
login.secure.mygovonline.msgsecure.com.au WE1 |
2024-10-21 - 2025-01-19 |
3 months | crt.sh |
yenergyconstruction.online R10 |
2024-10-22 - 2025-01-20 |
3 months | crt.sh |
*.api.secureserver.net Starfield Secure Certificate Authority - G2 |
2024-07-15 - 2025-08-16 |
a year | crt.sh |
postimg.cc E5 |
2024-10-20 - 2025-01-18 |
3 months | crt.sh |
*.secureserver.net Starfield Secure Certificate Authority - G2 |
2024-10-17 - 2025-11-18 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://login.secure.mygovonline.msgsecure.com.au/run/
Frame ID: C7D2EF7942566F50BE20B4AC6B337EAE
Requests: 7 HTTP requests in this frame
Frame:
https://yenergyconstruction.online/run/australian-mygov-RD1589-user-otp-detail-pic-tele/log.html
Frame ID: 3F00BBE316B002F6521CF671BFFEC336
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Login with myGov - myGovPage URL History Show full URLs
-
http://nosokhome.online/
HTTP 307
https://nosokhome.online/ HTTP 302
https://login.secure.mygovonline.msgsecure.com.au/run/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://nosokhome.online/
HTTP 307
https://nosokhome.online/ HTTP 302
https://login.secure.mygovonline.msgsecure.com.au/run/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://img1.wsimg.com/traffic-assets/js/tccl.min.js HTTP 301
- https://img1.wsimg.com/signals/js/clients/scc-c2/scc-c2.min.js
- https://yenergyconstruction.online/run/australian-mygov-RD1589-user-otp-detail-pic-tele HTTP 301
- https://yenergyconstruction.online/run/australian-mygov-RD1589-user-otp-detail-pic-tele/ HTTP 302
- https://yenergyconstruction.online/run/australian-mygov-RD1589-user-otp-detail-pic-tele/log.html
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
login.secure.mygovonline.msgsecure.com.au/run/ Redirect Chain
|
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
scc-c2.min.js
img1.wsimg.com/signals/js/clients/scc-c2/ Redirect Chain
|
105 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log.html
yenergyconstruction.online/run/australian-mygov-RD1589-user-otp-detail-pic-tele/ Frame 3F00 Redirect Chain
|
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
event
events.api.secureserver.net/t/1/tl/ |
43 B 300 B |
Fetch
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
event
events.api.secureserver.net/t/1/tl/ |
43 B 300 B |
Fetch
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favico.png
i.postimg.cc/Z5cKQ3TW/ |
238 B 481 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
eventbus
csp.secureserver.net/ |
0 0 |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
eventbus
csp.secureserver.net/ |
0 0 |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
eventbus
csp.secureserver.net/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
eventbus
csp.secureserver.net/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Australian Government (Government)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| _trfd object| _tcclInternal object| _expDataLayer object| _signalsDataLayer object| scc-c2 object| _trfq3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.msgsecure.com.au/ | Name: _tccl_visitor Value: 5212ab08-2ff6-4071-871b-148ae6c32159 |
|
.msgsecure.com.au/ | Name: _tccl_visit Value: 5212ab08-2ff6-4071-871b-148ae6c32159 |
|
.msgsecure.com.au/ | Name: _scc_session Value: pc=1&C_TOUCH=2024-10-27T23:26:43.385Z |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
csp.secureserver.net
events.api.secureserver.net
i.postimg.cc
img1.wsimg.com
login.secure.mygovonline.msgsecure.com.au
nosokhome.online
yenergyconstruction.online
104.126.37.131
172.67.165.42
203.161.61.2
23.56.202.168
46.105.222.81
84.32.84.32
95.100.135.66
1b4dacb0dafda81d48ee0890ea113b3b8275bf2d16d5325f971f16eb75f7218a
5e70f30259d620e25efa88586a8871d5c94113f0b0d7d6f3e817f585891bf154
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
bead33b39745a397ecd61ef167ccefe916508f9e4031ce125f8e718de675a159